15
Top 12 Predictions from Leading Cybersecurity Experts

Analytics Cybersecurity Predictions 2016

Embed Size (px)

Citation preview

Page 1: Analytics Cybersecurity Predictions 2016

Top 12 Predictions fromLeading Cybersecurity Experts

Page 2: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

What will 2016 hold for cybersecurity?Expect continued developments as both the public and private sectors implement

intelligence-led approaches to threats.

Page 3: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

12“New data sources arising from the

Internet of Things and biometrics will lead to a renewed government interest in using big data to prevent terrorism.” Andrew Borene, federal manager, i2 Safer Planet

Page 4: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

11“Private organizations will increase

their visibility into the dark web to become more proactive about cyberthreats than ever before.”Bob Stasio, senior product manager for

cyber threat analysis, i2 Safer Planet

Page 5: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

10“The international community will create safe zones in Syria to stem the mass migration to

Europe, and big data analytics will play an integral role in enforcing identity resolution and border security in those safe zones.”

Todd Rosenblum, senior executive forworldwide big data, i2 Safer Planet

Page 6: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“Companies and government agencies will begin using block-chain encryption

to protect against cyberthreats.”

Bob Stasio9

Page 7: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“Auditability and managed access of US citizens’ personal data will be an increasingly important requirementfor US national security agencies.”

Todd Rosenblum8

Page 8: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

7“Companies will begin properly

inventorying digital assets and data aspart of their risk management strategies,

heightening understanding of threat surfaces and ways of minimizing them.” Shahid Shah, CEO, Netspectives Communication

Page 9: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“‘Big X’ consulting firms will offer their customers cyberintelligence-as-

a-service consulting options.”Bob Stasio6

Page 10: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“Vulnerability curators will become increasingly prevalent as companies

learn to share breach data.”Shahid Shah5

Page 11: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“Continued cybersecurity breaches and state-sponsored cyber espionage will lead

to spikes in cybersecurity spending on both workforce and software solutions.”

Andrew Borene4

Page 12: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“Large financial organizations will continue divesting themselves

of managed security services to create their own fusion centers.”

Bob Stasio3

Page 13: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

“Third-party libraries and software components will increasingly gain

attention as CIOs and CISOs realize how many vulnerabilities they create.”

Shahid Shah2

Page 14: Analytics Cybersecurity Predictions 2016

ibm.co/threatintelligence

1“The market for behavioral

analytics and threat detection offerings will continue unabated.”

Bob Stasio